1
Subjects: ...Computer security....
View full text
Electronic eBook
2
Published 2007
Table of Contents: ...ASIAN’2006 -- Security Evaluation of a Type of Table-Network Implementation of Block Ciphers -- A...
View full text
Electronic eBook
3
Published 2015
Table of Contents: ..., Philanthropy, and Human Security: Concepts, and Contexts- Samiul Hasan -- Chapter 2: Human Security in A...
View full text
Electronic eBook
4
Subjects: ...Computational Intelligence. https://scigraph.springernature.com/ontologies/product-market-codes...
View full text
Electronic eBook
5
Published 2007
Table of Contents: ...-Offs in Secure Computation -- Federated Identity Management -- Accountable Anonymous Communication...
View full text
Electronic eBook
6
Published 2008
Table of Contents: ... Decentralized Model for Multi-Attribute Negotiations with Incomplete Information and General Utility Functions...
View full text
Electronic eBook
7
Published 2012
Table of Contents: ... Compute Units -- Relationship-Preserving Change Propagation in Process Ecosystems -- Scheduling Service...
View full text
Electronic eBook
8
Published 2007
Table of Contents: ...Power Aware Computing -- Real-Time Loop Scheduling with Energy Optimization Via DVS and ABB...
View full text
Electronic eBook
9
Published 2014
Table of Contents: ... Initialisation Method with Selection of Weights on the Basis of the Function Variability -- Soft Committee...
View full text
Electronic eBook
10
Published 2014
Table of Contents: ... Polarization -- Experimental Study and Analysis of Security Threats in Compromised Networks -- A Weighted...
View full text
Electronic eBook
11
Published 2010
Table of Contents: ...Bridging Calculus and Statistics: Null - Hypotheses Underlain by Functional Equations...
View full text
Electronic eBook
12
Published 2010
Table of Contents: ...Trusted and Pervasive Computing -- Foot Shape Analysis of Adult Male in the China -- Intelligent...
View full text
Electronic eBook
13
Published 2008
Table of Contents: ... of the Metric Deadline TSP -- On the Shortest Linear Straight-Line Program for Computing Linear Forms -- Flip...
View full text
Electronic eBook
14
Published 2007
Table of Contents: ... Services for Closed-Form Analysis of Their Performance and Reliability Bottlenecks -- SLA-Based Advance...
View full text
Electronic eBook
15
Published 2015
Table of Contents: ... Probabilistic Neural Network -- Passivity Analysis of BAM NNs with Mixed Time Delays -- Soft Computing -- A...
View full text
Electronic eBook
16
Published 2014
Table of Contents: ... -- Studies on Quasi-Z-Source-Based Isolated DC/DC Converter for Distributed Power Generation -- Security...
View full text
Electronic eBook
17
Published 2013
Table of Contents: ...Customized Opinion Mining using Intelligent Algorithms -- Information Security Measurement Roles...
View full text
Electronic eBook
18
Published 2014
Table of Contents: ...Computational Study of Blood Flow through Elastic Arteries with Porous Effects -- A Modified...
View full text
Electronic eBook
19
Published 2014
Table of Contents: ... by Construction -- Counter-bDM: A Provably Secure Family of Multi-Block-Length Compression Functions -- Universal...
View full text
Electronic eBook
20
Published 2012
Table of Contents: ... and Signatures -- Fully Secure Unbounded Inner-Product and Attribute-Based Encryption -- Computing...
View full text
Electronic eBook